27
CYBER TERRORISM By S. Sai Praveen Seva 12761A0551

Cyber Terrorism

Embed Size (px)

DESCRIPTION

Cyberterrorism is the use of Internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses. Cyberterrorism is a controversial term. Some authors choose a very narrow definition, relating to deployments, by known terrorist organizations, of disruption attacks against information systems for the primary purpose of creating alarm and panic. By this narrow definition, it is difficult to identify any instances of cyberterrorism. Cyberterrorism can be also defined as the intentional use of computer, networks, and public internet to cause destruction and harm for personal objectives.[1] Objectives may be political or ideological since this is a form of terrorism[citation needed]. There is much concern from government and media sources about potential damages that could be caused by cyberterrorism, and this has prompted official responses from government agencies.

Citation preview

CYBER TERRORISM

ByS. Sai Praveen Seva

12761A0551

OVERVIEW

•Terms

•Cyber-terrorists

•Why cyber-terrorism

•Forms of cyber-terrorism

•Impact

•Effects

•Examples

•Conclusion

TERMS

•Cyber terrorism – The use of the Net for

terrorism.

•Cyber crime – The use of the Net for criminal

actions.

•Cyber Attacks – Email bombs, viruses, intentional

actions.

•Information Warfare – Formalized governmental

warfare

•Techno Terrorism – Use of technology by terrorist

groups

CYBER-TERRORISTS

An individual that uses

computer\network technology (i.e.,

networks, computers, Internet) to 6-9-

cause intense fear; one who uses

computer\network technology to

control, dominate, or coerce through

the use of terror in furtherance of

political or social objectives.

• Cyber terrorist prefer using the cyber attack

methods because of many advantages for it

• It is cheaper than traditional

methods

• The action is very difficult to be tracked

• They can hide their personalities and location

• There are no physical barries or check to

cross

• Big targets can be attacked

• The tremendous, nole computer

stimulated crimals and terrorists

to make it their prefered tool for

attacking targets

Forms of CYBER-TERRORISM

1.Privacy Violation:

•The law of privacy is the

recognition of the

individual's right to be let

alone and to have his

personal space inviolate.

•Man has become sensitive

to publicity.

•Information technology

misuses the data of

private individuals

•A computer network

owned by the

Government may contain

valuable information

concerning defence and

other top secrets.

2.Secret information appropriation and data theft:

3.Distributed denial of Service

Attack

•The cyber terrorists may also use

the method of distributed denial

of services (DDOS) to

overburden the Government and

its agencies electronic bases.

•This is made possible by first

infecting several unprotected

computers by way of virus

attacks and then taking control of

them.

•This activity may divert

the attention of the

security agencies for the

time being thus giving

the terrorists extra time

and makes their task

comparatively easier.

4.Network Damage and Disruption:

What would the Impact be?

The intention of a cyber terrorism attack could range from

economic disruption through the interruption of financial

networks and systems or used in support of a physical

attack to cause further confusion and possible delays in

proper response

1.Direct Cost Implications.

2.Indirect Cost Implications.

Terrorists Groups

Sample Nuclear Launch

While Under Cyber Attack

Effects

•Cyber terrorism can have a serious large-scale

influence on significant number of people.

•It can weaken countries' economy greatly, thereby

stripping it of its resources and making it more

vulnerable to military attack.

Cyberspace

The New Realm of

Warfare

Examples

•Terrorists in Romania gained access to the

computers controlling the life support systems at an

Antarctic research station, endangering the 58

scientists involved.

•The official web site of the Presidential Palace of

Afghanistan was affected by a DOS attack that

rendered it inaccessible.

• The internet has provided

a virtual war for countries

having problems with

other such.

* As taiwan against

China.

* Israel against Palestine.

*India against pakistan,

China

What does a terrorist group achieve with a

cyber attack that they can’t with a

conventional attack?

Attacks are doubling each year

How can we protect ourselves?

•All accounts should have passwords and the

passwords should be unusual, difficult to guess

•Change the network configuration when defects

become visible

•Audit systems and check logs to help in detecting

and tracing an intruder

•If you are ever unsure about the safety of a site, or

receive suspicious email from an unknown address,

don't access it

CONCLUSION

• After a close look at some of the facts, I have come

to the these conclusions. Some of my conclusions

point to the fact that Cyberterrorism could be an

actually threat. But the other part is that there is too

much media hype created around the possiblity of a

Cyberterrorism.